…
Do you want to double-check that all of the information in your CSR is correct? Put your CSR into the form below, and the CSR Decoder tool will take care of the rest!
When it comes to obtaining an SSL certificate issued, a Certificate Signing Request, or CSR, is one of the most important documents. When completing a CSR, you must provide correct and verifiable information. During the validation process, the Certificate Authority will compare the information to the information in the CSR, and the information in the CSR will be used to populate the SSL certificate that is issued.
One of the first stages toward getting your SSL/TLS certificate is to create a certificate signing request (CSR). The CSR, generated on the same server where the certificate will be installed, provides information that the Certificate Authority (CA) will use to construct your certificate (e.g. common name, organization, and country). It also contains the public key that will be included in your certificate and the private key that will be used to sign it.
A CSR consists of three major components:
The Certificate Signing Request (CSR) Decoder tool decrypts the information in your CSR so you can check if it's accurate and current. You're likely renewing, and the detail in your CSR has changed or is no longer relevant. You must create a fresh CSR with precise information before submitting it to your CA in this scenario.
Your Certificate Signing Request should start with:
-----BEGIN CERTIFICATE REQUEST-----
and end with:
-----END CERTIFICATE REQUEST-----
Note: There should be five dashes on either side of both prompts.
Most CSRs are created in the Base-64 encoded PEM format.
A PEM format CSR can be opened in a text editor and looks like the following example:
-----BEGIN CERTIFICATE REQUEST-----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-----END CERTIFICATE REQUEST-----
http://
or https://
protocol element. For example, to secure https://www.example.com
, enter www.example.com
or *.example.com
for a wildcard certificatewww.example.net, www.example.org
. Adding additional domain names will generate a CSR appropriate for a UCC (Unified Communications Certificate) SSL certificateFix the cause, not the symptom.
Steve Maguire
…
…